@incollection{, 57F54EB8BF7F52A25C4B827CB52F39D4 , author={{V SaiVaishnav} and {AHarshita} and {K.Kondaya} and {K L University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}144713 } @incollection{b0, , title={{On securing untrusted clouds with cryptography}} , author={{ YChen } and { RSion }} , booktitle={{Proceedings of the 9th annual ACM workshop on Privacy in the electronic society}} the 9th annual ACM workshop on Privacy in the electronic society , publisher={ACM} , year={2010} } @incollection{b1, , title={{Privacypreserving public auditing for data storage security in cloud computing}} , author={{ CWang } and { QWang } and { KRen } and { WLou }} , booktitle={{INFOCOM}} , year={2010} } @book{b2, , title={{Proceedings IEEE}} IEEE , year={march 2010} } @incollection{b3, , title={{Enabling public auditability and data dynamics for storage security in cloud computing}} , author={{ QWang } and { CWang } and { KRen } and { WLou } and { JLi }} , journal={{IEEE Transactions on}} 22 5 , year={may 2011} , note={Parallel and Distributed Systems} } @book{b4, , title={{Secure and anonymous communication in the cloud}} , author={{ RLaurikainen }} TKK-CSE-B10 , year={2010} Aalto University School of Science and Technology, Department of Computer Science and Engineering , note={Tech. Rep.} } @incollection{b5, , title={{A client-based privacy manager forcloud computing}} , author={{ MMowbray } and { SPearson }} , booktitle={{Proceedings of the Fourth International ICST Conference on COMmunication System software and middleware, ser. COMSWARE '09}} the Fourth International ICST Conference on COMmunication System software and middleware, ser. COMSWARE '09New York, NY, USA , publisher={ACM} , year={2009} 5 } @incollection{b6, , title={{Towards an anonymous access control and accountability scheme for cloud computing}} , author={{ MJensen } and { SSchage } and { JSchwenk }} , booktitle={{Cloud Computing (CLOUD), 2010 IEEE 3 rd International Conference on}} , year={july 2010} } @incollection{b7, , title={{Group signatures}} , author={{ DChaum } and { EVan Heyst }} , booktitle={{Advances in CryptologyEUROCRYPT91}} , publisher={Springer} , year={1991} } @incollection{b8, , title={{An entitycentric approach for privacy and identity management in cloud computing}} , author={{ PAngin } and { BBhargava } and { RRanchal } and { NSingh } and { MLinderman } and { LOthmane } and { LLilien }} , booktitle={{Reliable Distributed Systems}} , publisher={IEEE} , year={2010. 2010} , note={29th IEEE Symposium on} } @incollection{b9, , title={{How to prove yourself: practical solutions to identification and signature problems}} , author={{ AFiat } and { AShamir }} , booktitle={{Advances in Cryptology-Crypto86}} , publisher={Springer} , year={1987} } @incollection{b10, , title={{Online subscriptions with anonymous access}} , author={{ MBlanton }} , booktitle={{Proceedings of the 2008 ACM symposium on Information, computer and communications security, ser. ASIACCS '08}} the 2008 ACM symposium on Information, computer and communications security, ser. ASIACCS '08New York, NY, USA , publisher={ACM} , year={2008} } @incollection{b11, , title={{Signature schemes and anonymous credentials from bilinear maps}} , author={{ JCamenisch } and { ALysyanskaya }} , booktitle={{Advances in Cryptology -CRYPTO 2004, 24th Annual International CryptologyConference}} Santa Barbara, California, USA , year={August 15-19, 2004. 2004} } @incollection{b12, , title={{Secure provenance: the essential of bread and butter of data forensics in cloud computing}} , author={{ RLu } and { XLin } and { XLiang } and { XSShen }} , booktitle={{Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS '10}} the 5th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS '10New York, NY, USA , publisher={ACM} , year={2010} } @incollection{b13, , title={{Spice-simple privacy-preserving identity-management for cloud environment}} , author={{ SChow } and { YHe } and { LHui } and { SYiu }} , booktitle={{Applied Cryptography and Network Security}} , publisher={Springer} , year={2012} } @incollection{b14, , title={{Compact group signatures without random oracles}} , author={{ XBoyen } and { BWaters }} , booktitle={{Advances in Cryptology-EUROCRYPT 2006}} , year={2006} } @incollection{b15, , title={{Accelerated modular arithmetic for lowperformance devices}} , author={{ LMalina } and { JHajny }} , booktitle={{I Telecommunications and Signal Processing(TSP), 2011 34th International Conference on}} , publisher={IEEE} , year={2011} } @incollection{b16, , title={{Secure authentication and key establishment in the sip architecture}} , author={{ LMalina } and { M }} , booktitle={{Telecommunications and Signal Processing (TSP), 2011 34th International Conference on}} , publisher={IEEE} , year={2011} } @book{b17, , title={{Full-domain subgroup hiding and constantsize group signatures}} , author={{ XBoyen } and { BWaters }} , year={2007. 2007} , note={Public Key Cryptography-PKC} } @incollection{b18, , title={{Unlinkable attribute-based credentials with practical revocation on smartcards}} , author={{ JHajny } and { LMalina }} , booktitle={{Proceedings of the 11th international conference on Smart Card Research and Advanced Applications, ser. CARDIS'12}} the 11th international conference on Smart Card Research and Advanced Applications, ser. CARDIS'12 , publisher={Springer-Verlag} , year={2013} } @book{b19, , title={{Modular design of secure, yet practical cryptographic protocols}} , author={{ RCramer }} , year={1996} University of Amsterdam , note={Ph.D. dissertation} } @incollection{b20, , title={{Proof systems for general statements about discrete logarithms}} , author={{ JCamenisch } and { MStadler }} , journal={{Tech. Rep}} , year={1997} } @incollection{b21, , title={{A new public-key cryptosystem as secure as factoring}} , author={{ TOkamoto } and { SUchiyama }} , booktitle={{Advances in Cryptology -EUROCRYPT 98}} , booktitle={{ser. Lecture Notes in Computer Science}} , publisher={Springer Berlin / Heidelberg} , year={1998} 1403 } @incollection{b22, , title={{Practical revocable anonymous credentials}} , author={{ JHajny } and { LMalina }} , booktitle={{Communications and Multimedia Security}} , publisher={Springer} , year={2012} } @incollection{b23, , title={{Optimization of differential power analysis}} , author={{ ZMartinasek } and { TMacha } and { ORaso } and { JMartinasek } and { PSilhavy }} , journal={{PRZEGLAD ELEKTROTECHNICZNY}} 87 12 , year={2011} }